Vulnerability Details : CVE-2021-28204
The specific function in ASUS BMC’s firmware Web management page (Modify user’s information function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary.
Exploit prediction scoring system (EPSS) score for CVE-2021-28204
Probability of exploitation activity in the next 30 days: 0.45%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-28204
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
TWCERT/CC |
CWE ids for CVE-2021-28204
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by:
- nvd@nist.gov (Primary)
- twcert@cert.org.tw (Secondary)
References for CVE-2021-28204
-
https://www.asus.com/tw/support/callus/
官方支援 | ASUS 台灣Vendor Advisory
-
https://www.twcert.org.tw/tw/cp-132-4574-b61a6-1.html
TWCERT/CC台灣電腦網路危機處理暨協調中心-ASUS BMC's firmware: command injection - 修改用戶資訊功能Third Party Advisory
-
https://www.asus.com/content/ASUS-Product-Security-Advisory/
ASUS Product Security Advisory | ASUS GlobalVendor Advisory
Products affected by CVE-2021-28204
- cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*
- cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*
- cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*